Journey
Timeline timeline title Campaign Progression section Training Ground 2001 : Spawn Point 2019 : …
75 articles across 7 years
Timeline timeline title Campaign Progression section Training Ground 2001 : Spawn Point 2019 : …
1. Big Endian (The “Natural” Way) MSB first & LSB last as we normally write Memory Layout for …
Linux Theory User space <-> Kernel space & Driver Interface What communication method i use to …
“Before Linux prints its first log, the CPU has already taken a long, carefully choreographed …
Overview Character devices are distinguished by the fact that they are accessed as a stream of …
Purpose: Organize your learnings into a concise article that explains split choices, rules-of-thumb, …
Static site generators such as Hugo deliver speed, security, and simplicity by avoiding servers and …
The most powerful tool you can have is the ability to move information freely. Efficiently …
1. Overview A kernel module provides a way to extend kernel functionality without rebuilding the …
Overview Buildroot is a powerful tool that automates building cross‑compilers, kernel images, …
Overview When working with large graphics APIs like OpenGL ES and EGL, especially in complex systems …
Android and Linux systems rely on various communication methods for processes and threads to …
Android - System Architecture Linux Kernel Layer Manages core system services such as security, …
Overview of DNS The Domain Name System (DNS) is the cornerstone of the modern internet, acting as a …
Generating a Patch Using diff 1. Extract the Original Source Ensure you have a pristine copy of the …
Overview ssh-audit is a tool for ssh server & client configuration auditing(banner, key exchange, …
This File contains all the markdown formatting which include generic markdown as well as obsidian …
Install nfs-kernel-server mkdir ~/Public Export the rootfs folder Add the following entry to …
Process Mount recovery partition into temporary location mkdir -p /mnt/recovery mount /dev/mmcblk0p6 …
1. Overview Process Context The kernel executes code on behalf of a user-space process (e.g., …
1. System Call Basics System calls (syscalls) are the interface for user-space programs to request …
1. Interrupt Generation A hardware device (e.g., NIC, keyboard) raises an interrupt via the …
Q1: What happens if another interrupt occurs while a top half (ISR) is executing? Answer: By …
What it is: A table used by the CPU to map interrupt/exception numbers to their corresponding …
Overview An interrupt is a signal that breaks the normal execution flow to handle an event. When an …
The POCO C++ Libraries are powerful cross-platform C++ libraries for building network- and …
Using External Toolchain Option 1: Give tarball URL Specify URL for the tarball in …
Comparison Table Data Structure Structure Type Search Complexity Insertion Complexity Deletion …
Overview A relocatable toolchain/SDK is a self-contained set of cross-compilation tools that can be …
Truth Table X Y X & Y X | Y X ^ Y 0 0 0 0 0 0 1 0 1 1 1 0 0 1 1 1 1 1 1 0 Points to Remember The …
Introduction GPIO (General Purpose Input/Output) is a fundamental interface in embedded systems and …
Overview A Bayer filter is a color filter array (CFA) that arranges RGB color filters on a square …
SPI (Serial Peripheral Interface) Overview Synchronous, full-duplex serial bus. Master-slave …
UART (Universal Asynchronous Receiver-Transmitter) UART is a simple, asynchronous serial …
1. Introduction In a multitasking environment, multiple processes and threads may need to access …
Monolithic Kernel All core OS services (memory management, process scheduling, file systems, …
Overview Kernel Space: This is where the Linux kernel executes and provides low-level access to …
1. Overview RTOS (Real-Time Operating System): Designed for deterministic, time-critical …
1. Linux Kernel Internals Importance: Understanding kernel internals is crucial for BSP and driver …
Reference GirFlow Explained: https://youtu.be/Aa8RpP0sf-Y
SHA-256 is a cryptographic hash function that produces a fixed-size 256-bit (32-byte) hash. It is …
CRC is an error-detection code used to detect accidental changes to raw data (e.g., during …
Overview The Device Tree (DT) is a data structure used to describe the hardware components of a …
ioctl Implementation in Kernel Device Drivers Overview ioctl (Input/Output Control) is a powerful …
An SSL certificate is a digital certificate issued by a trusted third-party authority known as a …
Its purpose is to ensure that all data transmitted between the server and the client remains private …
Overall Idea Avoid immediate trading post-result; monitor price behaviour instead. Monitor for …
Alt + H = Horizontal line Alt + V = Vertical line Alt + T = Trendline Alt + F = Fibonacci Alt + C = …
Problem In bootloader the environment variables are accessible. The values could be accessed and …
This guide provides step-by-step instructions for setting up consistent formatting, rules checking, …
Number Macro Log Level Description Equivalent 0 pr_emerg Emergency System is unusable. KERN_EMERG 1 …
Overview Get the final files into a directory eg. target and treat it as root(/) directory of target …
This article is pending because of my laziness Objective Make a website(digital garden) which …
Basics of I2C Overview Synchronous, multi-master, multi-slave serial bus. Half-duplex communication …
Example Image Tree Source (.its) file /dts-v1/; / { description = "U-Boot FIT source file for arm"; …
Device Tree Standard Properties compatible The compatible property value consists of one or more …
Overview U-Boot expects all bootable files (kernel, device tree blobs, initramfs, scripts, etc.) to …
RSA (Rivest–Shamir–Adleman) is an asymmetric cryptographic algorithm, widely used for secure data …
Compression Format Comparison Format Compression Ratio Speed (Compression/ Decompression) Encryption …
ABCPL1234X Format First 3 Characters: Random letters (e.g., ABC). 4th Character: Category of the …
Official Description The cu command is used to call up another system and act as a dial-in terminal …
Holonomic Drive Robot: A Versatile Path-Planning Machine Overview The Holonomic Drive Robot is an …
Sections Executable programs or shell commands System calls (functions provided by the kernel) …
What is Operating System ? An operating system (OS) is system software that manages computer …
/e/ OS settings put global captive_portal_http_url http://204.ecloud.global settings put global …
Job profile of a farmer A Farmer is the CEO, COO, CFO, Sales manager, Investment manager of a …
Analyzing the past It is a well established fact that stock prices show cyclical movements, similar …
Introduction For example, one dad would say, “The love of money is the root of all evil.” The other, …
Preparation Install Dependencies sudo pacman -S base-devel xmlto kmod inetutils bc libelf git …
.xinitrc The ~/.xinitrc file is a shell script read by xinit and by its front-end startx. It is …
Packages on Arch pacstrap base linux-lts linux-lts-headers base-devel btrfs btrfs-progs vim …
Undoing Mistakes in Git 1. Discarding Uncommitted Changes a) git restore <file> Discards uncommitted …
Ofcource my notes are are derived from Arch Wiki. And I highly recommend to read it too. These notes …
Duration: Oct 2020 – Feb 2021 Team Members: Rishav Singh, Kashyap Joshi Technology: Python, ROS, …